US6216230B1 - Notebook security system (NBS) - Google Patents

Notebook security system (NBS) Download PDF

Info

Publication number
US6216230B1
US6216230B1 US09/127,218 US12721898A US6216230B1 US 6216230 B1 US6216230 B1 US 6216230B1 US 12721898 A US12721898 A US 12721898A US 6216230 B1 US6216230 B1 US 6216230B1
Authority
US
United States
Prior art keywords
serial number
computer
copy
validation
key device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
US09/127,218
Other languages
English (en)
Inventor
William N. Rallis
Yaacov Behar
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Durango Corp
Original Assignee
Durango Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US09/022,088 external-priority patent/US6189099B1/en
Application filed by Durango Corp filed Critical Durango Corp
Priority to US09/127,218 priority Critical patent/US6216230B1/en
Priority to DE69905901T priority patent/DE69905901D1/de
Priority to AT99937667T priority patent/ATE234481T1/de
Priority to PCT/US1999/017315 priority patent/WO2000007088A1/fr
Priority to AU52455/99A priority patent/AU5245599A/en
Priority to EP99937667A priority patent/EP1099147B1/fr
Priority to US09/685,811 priority patent/US6425084B1/en
Publication of US6216230B1 publication Critical patent/US6216230B1/en
Application granted granted Critical
Assigned to DURANGO CORPORATION reassignment DURANGO CORPORATION RELEASE AND STOCK TRANSFER Assignors: RALLIS, WILLIAM N.
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3672Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes initialising or reloading thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/006Identification

Definitions

  • a security system constructed in accordance with the invention implements a user-validation procedure that requires the user to connect the proper hardware “key” device to a computer at power-up to enable operation.
  • the system can support multiple users and a single supervisor. Each authorized user is provided with a unique key device which is carried and stored separately from the computer. The key device holds a unique serial number and an encryption key.
  • a validation record stored on the computer's hard disk contains an unencrypted key device serial number, an encrypted hard disk serial number, and a Personal Identification Number (PIN) unique to the user.
  • the user is prompted to connect the key device to the computer.
  • the user is prompted to enter a PIN, although the system can be configured to operate without manual PIN entry.
  • the procedure permits entry past a first security level only if the key device serial number matches the unencrypted numbers in the validation record. If the first-level validation is successful, the procedure then uses the encryption key to decrypt the hard drive serial number and PIN found in the stored validation record.
  • the procedure permits entry past the second security level only if the validation record is properly decrypted, the installed hard disk serial number matches the decrypted number, and the manually-entered PIN matches the decrypted PIN.
  • a failure at any step in the user-validation procedure will immediately power down the computer, thereby rendering it useless to a thief not possessing the required key device.
  • the key device is not required for normal computer operations, after the user-validation procedure has successfully terminated, the user can remove the key device and keep it separate from the computer. Moreover, the small size of the key device makes it easy to transport and keep safe.
  • FIG. 1A is an illustration of the Notebook Security System (NBS);
  • FIG. 1B is an illustration of a key device
  • FIG. 2 is a block diagram of the major components within the CPU address space of an IBM-PC compatible computer
  • FIG. 3 is a flow diagram of the boot and user-validation procedure
  • FIGS. 4A-4C depict the PS2/USB interface protocol
  • FIGS. 5A-5F illustrate various key device-to-computer interfaces
  • FIGS. 6A-6E illustrate various IR key device configurations
  • FIG. 7 depicts the IR interface message framing format
  • FIG. 8 is a block diagram of the software partitioning of an IBM-PC compatible computer.
  • FIG. 9 is a depiction of the user screen of the user-validation program application.
  • FIG. 1A shows a key device 20 connected to a notebook computer 10 .
  • the key device 20 shown in FIG. 1B, has no external controls and is comprised of a microcomputer 22 , a read-only-memory 24 and a connector 26 .
  • the connector 26 may attach to one of the I/O ports on the notebook computer 10 .
  • the preferred key device connection is via a PS-2 connector 12 , although alternative connections, such as a Universal Serial Bus (USB) 14 and an Infra-Red (IR) port 16 , can be used as described below.
  • USB Universal Serial Bus
  • IR Infra-Red
  • the key device 20 is of such shape and size as to be placed on the user's key chain. It receives power and command messages from the notebook computer 10 and returns response messages, a serial number and an encryption key. A program running on the notebook computer 10 uses the key device serial number and the encryption key, along with a Personal Identification Number (PIN), in a user-validation procedure to prevent operation (i.e. power-up) of the note book computer 10 by an unauthorized user. For maximum security protection, the key device 20 is connected only during the user-validation procedure and is carried and stored separately from the notebook computer 10 .
  • PIN Personal Identification Number
  • FIG. 2 is a block diagram of the major components within the Central Processing Unit (CPU) 50 address space for a conventional IBM PC-compatible computer.
  • the CPU 50 accesses the Basic Input/Output System (BIOS) Read-Only Memory (ROM) 30 and executes a “boot-up” procedure.
  • BIOS Basic Input/Output System
  • ROM Read-Only Memory
  • the CPU downloads the operating system (OS) program via a memory-mapped interface 40 from a mass storage device, such as a hard drive 42 or possibly a diskette 44 , and reads it into main Random-Access Memory (RAM) memory 60 .
  • the boot-up user-validation program resides in a ROM adapter 34 of the BIOS 30 and is executed at boot-up and prior to the download of the operating system.
  • Step 1 the user-validation program prompts the user to attach the key device 20 to the notebook computer 10 .
  • the program attempts to communicate with the key device 20 for a fixed delay period. If a key device 20 is not detected within this period, then the program proceeds to Step 11 where the computer is automatically powered down.
  • Step 2 the program reads the key device serial number and encryption key that are stored in the key device ROM 24 .
  • the key device serial number and encryption key usually a large prime number, are loaded into the key device 20 by the manufacturer.
  • the protocol for interfacing the key device 20 to the computer 10 through a PS-2 port 12 or a USB port 14 is shown in FIG. 4 .
  • the first portion, shown in FIG. 4A, is the standard, or conventional, initialization protocol flow between the notebook computer 10 and either a keyboard 46 or a mouse 48 .
  • a read identification (F2) command is then issued and a keyboard 46 , for example, will return an acknowledgment (FA) response and the “AB 41 ” identification number.
  • FIG. 4 B A novel protocol for reading the key device data through a PS-2 or USB port is shown in FIG. 4 B.
  • the key device 20 waits for a unique two-command sequence that it will recognize as the cue for sending the key device serial number and encryption key.
  • the sequence is shown as an echo (EE) command followed by a read identification (F2) command.
  • the program sends an echo (EE) command to the key device 20 .
  • the key device 20 returns an echo (EE) response.
  • the program issues a read identification (F2) command to the key device 20 .
  • the key device 20 returns an acknowledgment (FA) response and the “AB 41 ” identification number and further appends the key device serial number and encryption key.
  • the key device 20 appends the serial number and encryption key only when the read identification (F2) command is immediately preceded by the echo (EE) command.
  • Step 3 the program compares the key device serial number to the corresponding number in a set of stored validation records, one of which is maintained for each user.
  • the records are stored in a reserved sector of the hard disk 42 , or other mass storage device, preferably when the security system software is installed on the computer.
  • Each validation record is comprised of the following fields:
  • FIELD 1 key device serial number (standard ASCII characters)
  • FIELD 2 personal identification number (PIN) (encrypted)
  • FIELD 4 level: user or supervisor (encrypted)
  • FIELD 6 user information (encrypted)
  • Step 4 the program uses the encryption key to decrypt the encrypted portions of the validation record. If the decrypted record reads as plain ASCII text, the program moves to Step 5, otherwise, it proceeds to Step 9.
  • Step 5 the user-validation program prompts the user to enter a PIN.
  • the PIN consists of a string of six to eight characters.
  • Step 6 the program compares the PIN to the corresponding number stored in field 2 of the decrypted validation record. If the numbers do not match, the program moves to Step 11. If the system is configured to operate without the manual entry of a password or PIN, Steps 5 and 6 are bypassed.
  • the program reads the serial number of an internal device, preferably the hard disk 42 .
  • the retrieved serial number is compared to the plain text serial number of field 3 of the validation record. If the serial numbers match, the user has been validated. If the numbers do not match, the program moves to Step 11.
  • Step 10 the program waits for the key device 20 to be disconnected from the notebook computer 10 . It periodically executes the read protocol of FIG. 4B to determines whether the key device serial number and encryption key data are appended to the acknowledgment (FA) response. When the key device data is not appended to the acknowledgment (FA) response, the program terminates and normal computer operations can commence.
  • a supervisor is designated by setting the single bit of field 4 of the validation record. If the bit is set, the supervisor can gain access to the users' encryption keys which are stored in field 5 .
  • the user information in field 6 holds user-specific data stored for informational purposes.
  • a “super key” access code procedure may be programmed by the manufacturer into the key device 20 , and a “super key” verification step may be inserted at the start of the user validation procedure.
  • the access code procedure requires the key device 20 to verify receipt of a matching code number before it will output the serial number and encryption key data.
  • the access code “hops”, or changes, each time the key device 20 is accessed.
  • FIG. 4 C A novel protocol for writing data to the key device 20 through a PS-2 port 12 or a USB port 14 is shown in FIG. 4 C.
  • the write protocol is executed after the initialization protocol of FIG. 4 A and prior to the read protocol of FIG. 4 B.
  • the key device 20 waits for a unique two-command sequence that it will recognize as the signal that the program is sending one byte of data. For illustrative purposes, the sequence is shown as two consecutive echo (EE) commands.
  • the key device 20 returns an acknowledgment (FA) response.
  • the “super key” access code number that is sent by the program to the key device 20 may be longer than one byte.
  • the write protocol of FIG. 4C is repeated as necessary for each additional byte of data.
  • the key device 20 microprocessor 22 concatenates the low and high nibbles and compares the resulting number to the access code number stored in its memory 24 . If the numbers do not match, the key device 20 will not append the serial number and encryption key data to the acknowledgment (FA) response as shown in FIG. 4 B.
  • the key device 20 can include special security features, such as a finger print reader 28 (FIG. 5 C), or a “smartcard” reader that senses data on a “smartcard” 29 (FIG. 5 D), to generate key data. This data is forwarded by the key device 20 to the user-validation program in a manner identical to the transmission of serial number and encryption key data.
  • a PS-2 “Y” connector 13 equipped with an internal automatic switch (not shown), is employed to permit the simultaneous PS-2 connection of a key device 20 and a keyboard 46 (or mouse 48 ) to a notebook computer 10 as shown in FIG. 5 E.
  • the key device 20 is connected to the keyboard port 18 of a desktop computer 11 via a AT “Y” connector 19 , equipped with an internal automatic switch (not shown), that also permits the simultaneous connection of an AT keyboard 47 as shown in FIG. 5 F.
  • the internal automatic switch (not shown) in each “Y” connector is controlled by an internal microprocessor (not shown).
  • the switch is configured to be normally open at the key device port and normally closed at the “pass-through” port of each “Y” connector.
  • the microprocessor monitors the transmissions across the switch. When it detects the protocol command sequences described above, it temporarily switches the connection to the key device port and relays the command and response messages between the computer and the key device 20 . The switch automatically reverts back to pass-through mode when the computer 10 /key device 20 communications are completed.
  • the IR key device 21 is equipped for Infrared (IR) communications with a notebook computer 10 via the IR port 16 as shown in FIG. 6 A.
  • the IR key device 21 is of such shape and size as to be placed on the user's key chain. It is self-powered and in its basic configuration, as shown in FIG. 6B, includes an IR transmitter 27 and a momentary transmit switch 25 , in addition to a microprocessor and ROM (not shown).
  • the user aligns the IR key device 21 with the IR port 16 and depresses the switch 25 within the allotted time period (e.g. 30 seconds).
  • the IR key device 21 transmits a message that includes the key device serial number and the encryption key using the Ultra Protocol as established by the Infrared Data Association (IrDA).
  • IrDA Infrared Data Association
  • the Ultra Protocol for exchanging messages between the IR key device 21 and the computer 10 through the IR port 16 is documented in “Infrared Data Association Guidelines for Ultra Protocols” which is incorporated by reference.
  • the message framing and layer specific headers are shown in FIG. 7 .
  • the IR key device 21 utilizes a frame 70 identified by a unique Protocol Identification (PID) field 71 value, e.g. 02 h, assigned and reserved by IrDA.
  • PID Protocol Identification
  • the key data resides in the variable length protocol data field 72 .
  • the frame size is specified in the Frame Check Sequence (FCS) field 73 which is CRC-CCITT (Cyclic Redundancy Check—International Canal and Telephone Consultative Committee; CRC with polynomial equal to X 16 +X 12 +X 5 +1) error correction encoded.
  • FCS Frame Check Sequence
  • CRC-CCITT Cyclic Redundancy Check—International Canal and Telephone Consultative Committee; CRC with polynomial equal to X 16 +X 12 +X 5 +1
  • EEF end-of-file
  • the IR key device 21 includes both an IR transmitter and IR receiver, but does not include a transmit switch.
  • the IR key device 21 remains the powered-down state until it receives an IR pulse.
  • the user-validation program prompts the user to align the IR key device 21 with the IR port 16 , it transmits a command message containing a “super key” access code number.
  • the access code procedure requires the IR key device 21 to verify receipt of a matching code number before it will output the serial number and encryption key data.
  • the access code “hops”, or changes, each time the IR key device 21 is accessed. If the IR key device 21 verifies a match between the received access code and a number stored within the device, it transmits a response message containing the key device serial number and the encryption key.
  • the IR key device 21 can include special security features, such as a finger print reader 28 (FIG. 6 C), or a “smartcard” reader that senses data on a “smartcard” 29 (FIG. 6 D), to generate the key data.
  • This data is forwarded to the user-validation program in a manner identical to the IR transmission of the serial number and encryption key data, although a new PID is assigned to each new configuration.
  • a PS-2/IR “Y” connector 17 equipped with an internal automatic switch (not shown), is employed to permit the simultaneous IR connection of an IR key device 21 and a keyboard 46 (or mouse 48 ) to a notebook computer 10 as shown in FIG. 6 E.
  • the key device 20 may be implemented as a Personal Computer Memory Card Industry Association (PCMCIA) card, a floppy diskette, or by any other detachable means for providing a key device serial number and an encryption key to the notebook computer 10 .
  • PCMCIA Personal Computer Memory Card Industry Association
  • an application program that implements the user-validation procedure may be installed with the security system and, preferably, on a Microsoft Windows 95/98/NT/CE platform.
  • the application will provide either (user selected) automatic hard disk lock-up or computer power-down that triggers during normal operation after expiration of a user-defined inactivity period.
  • the application also supports manual initiation of lock-up or power-down. In cases where the ROM BIOS program is not installed, the application can be used to prevent unauthorized user access to the hard disk contents.
  • an Operating System Interface is provided.
  • the application 92 is interfaced to the operating system 100 via an Application Program Interface (API) layer 90 as shown in FIG. 8 .
  • the OSI is comprised of two parts: the key device driver 112 and the OS visual interface.
  • an interface layer 110 supports various drivers, such as a disk driver 114 , a key device driver 112 , and a network driver 116 .
  • the key device driver 112 provides the application interface to the key device 20 . It reads the key device serial number and the encryption key, matches the key device serial number to that of the validation record stored on the hard disk, and uses the encryption key to decrypt the encrypted portion of the validation record.
  • FIG. 9 An OS visual interface is illustrated in FIG. 9 .
  • the interface is comprised of a display window 82 for displaying messages to the user during the user-validation procedure or setting program parameters, a task bar “key” object 84 to either lock/unlock the hard disk or power-down the computer, a “key” icon 86 in the control panel for adjusting program parameters, and a “vault” object 88 to indicate whether the hard disk is locked or not (e.g. the vault door is either closed or open).
  • warning label it is desirable that some form of warning label be applied to the exterior of the notebook computer 10 to deter a would-be thief. Such a practice is common with home burglary systems.
  • the label should state that the computer is protected by a security system that will not permit operation without a special key device.
  • the key device 20 may also be used as a new and improved “dongle” for software copy protection.
  • a dongle is a hardware security device that attaches to an I/O port, typically the parallel port, of a computer and contains a unique key number.
  • third party applications 91 may require retrieval of a key, such as that stored in a dongle, to permit execution. With little or no modification, the key device 20 may be used as a dongle.
  • software developers may incorporate into their applications the user validation procedure and PS-2/USB/IR communications protocols described above.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Hardware Redundancy (AREA)
  • Alarm Systems (AREA)
US09/127,218 1998-02-11 1998-07-31 Notebook security system (NBS) Expired - Fee Related US6216230B1 (en)

Priority Applications (7)

Application Number Priority Date Filing Date Title
US09/127,218 US6216230B1 (en) 1998-02-11 1998-07-31 Notebook security system (NBS)
AU52455/99A AU5245599A (en) 1998-07-31 1999-07-29 Notebook security system (nbs)
AT99937667T ATE234481T1 (de) 1998-07-31 1999-07-29 Notebookrechner-sicherungssystem
PCT/US1999/017315 WO2000007088A1 (fr) 1998-07-31 1999-07-29 Systeme de securite pour ordinateur portatif
DE69905901T DE69905901D1 (de) 1998-07-31 1999-07-29 Notebookrechner-sicherungssystem
EP99937667A EP1099147B1 (fr) 1998-07-31 1999-07-29 Systeme de securite pour ordinateur portatif
US09/685,811 US6425084B1 (en) 1998-02-11 2000-10-10 Notebook security system using infrared key

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/022,088 US6189099B1 (en) 1998-02-11 1998-02-11 Notebook security system (NBS)
US09/127,218 US6216230B1 (en) 1998-02-11 1998-07-31 Notebook security system (NBS)

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/022,088 Continuation-In-Part US6189099B1 (en) 1998-02-11 1998-02-11 Notebook security system (NBS)

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US09/685,811 Continuation US6425084B1 (en) 1998-02-11 2000-10-10 Notebook security system using infrared key

Publications (1)

Publication Number Publication Date
US6216230B1 true US6216230B1 (en) 2001-04-10

Family

ID=22428930

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/127,218 Expired - Fee Related US6216230B1 (en) 1998-02-11 1998-07-31 Notebook security system (NBS)
US09/685,811 Expired - Fee Related US6425084B1 (en) 1998-02-11 2000-10-10 Notebook security system using infrared key

Family Applications After (1)

Application Number Title Priority Date Filing Date
US09/685,811 Expired - Fee Related US6425084B1 (en) 1998-02-11 2000-10-10 Notebook security system using infrared key

Country Status (6)

Country Link
US (2) US6216230B1 (fr)
EP (1) EP1099147B1 (fr)
AT (1) ATE234481T1 (fr)
AU (1) AU5245599A (fr)
DE (1) DE69905901D1 (fr)
WO (1) WO2000007088A1 (fr)

Cited By (68)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6275933B1 (en) * 1999-04-30 2001-08-14 3Com Corporation Security system for a computerized apparatus
KR20010082420A (ko) * 2001-06-19 2001-08-30 서정욱 범용 직렬 버스용 암복호화 장치
US20010043702A1 (en) * 1999-01-15 2001-11-22 Laszlo Elteto USB hub keypad
US20020007354A1 (en) * 2000-07-14 2002-01-17 Sony Corporation Method and system for identifying a time specific event
US20020010652A1 (en) * 2000-07-14 2002-01-24 Sony Corporation Vendor ID tracking for e-marker
US6401205B1 (en) * 1998-02-11 2002-06-04 Durango Corporation Infrared type security system for a computer
US6425084B1 (en) * 1998-02-11 2002-07-23 Durango Corporation Notebook security system using infrared key
US20020141588A1 (en) * 2001-03-27 2002-10-03 Rollins Doug L. Data security for digital data storage
US20020145589A1 (en) * 2001-04-06 2002-10-10 Sony Corporation Of Japan User interface for an e-marker
EP1271277A2 (fr) * 2001-06-26 2003-01-02 Redstrike B.V. Système de sécurité pour empêcher l'utilisation frauduleuse d'un ordinateur
US20030034956A1 (en) * 2001-08-17 2003-02-20 Yuichiro Deguchi Virtual e-marker
US20030036352A1 (en) * 2001-08-17 2003-02-20 Sony Corporation Embedded e-marker and communication system
US20030036967A1 (en) * 2001-08-17 2003-02-20 Yuichiro Deguchi Electronic music marker device delayed notification
US6564325B1 (en) * 1999-05-07 2003-05-13 Nortel Networks Limited Method of and apparatus for providing multi-level security access to system
US20030110133A1 (en) * 2001-12-07 2003-06-12 Maritzen L. Michael Automated digital rights management and payment system with embedded content
US6671808B1 (en) * 1999-01-15 2003-12-30 Rainbow Technologies, Inc. USB-compliant personal key
US20040000995A1 (en) * 2002-06-28 2004-01-01 Yuichiro Deguchi GPS e-marker
US20040003150A1 (en) * 2002-06-28 2004-01-01 Sony Corporation Appliance with built-in integrated communication port
US20040002938A1 (en) * 2002-06-28 2004-01-01 Sony Corporation And Sony Electronics Inc. Device and method for exchanging information
US6675300B1 (en) * 1999-03-12 2004-01-06 Samsung Electronics Co., Ltd. Remote controlled computer system and management method having an identification number
US20040049686A1 (en) * 2002-09-05 2004-03-11 Chun-Yu Chen Fingerprint identification applied data storage system and method
US20040049679A1 (en) * 2000-11-21 2004-03-11 Claude Meggle Authenticating method and device
US20040098585A1 (en) * 2002-11-05 2004-05-20 Rainbow Technologies, Inc. Secure authentication using hardware token and computer fingerprint
US20040098596A1 (en) * 2002-11-15 2004-05-20 Rainbow Technologies, Inc. Driverless USB security token
US6763399B2 (en) * 1998-11-10 2004-07-13 Aladdin Knowledge Systems, Ltd. USB key apparatus for interacting with a USB host via a USB port
US20040143730A1 (en) * 2001-06-15 2004-07-22 Wu Wen Universal secure messaging for remote security tokens
US20040170068A1 (en) * 2003-02-27 2004-09-02 Williams Emrys J. Anti-theft system and method for semiconductor devices and other electronic components
US6857076B1 (en) 1999-03-26 2005-02-15 Micron Technology, Inc. Data security for digital data storage
US20050182872A1 (en) * 2001-12-29 2005-08-18 Tai Guen Enterprise Co., Ltd Portable data conversion processor with standard data port
US20050188224A1 (en) * 2004-01-05 2005-08-25 Betts-Lacroix Jonathan Connector including electronic device
US20050211788A1 (en) * 2000-03-15 2005-09-29 Nicolas Drabczuk Method of communication between a smart card and a host station
US20050240779A1 (en) * 2004-04-26 2005-10-27 Aull Kenneth W Secure local or remote biometric(s) identity and privilege (BIOTOKEN)
US20050251596A1 (en) * 2002-07-15 2005-11-10 Axalto Sa Usb device
US20050262361A1 (en) * 2004-05-24 2005-11-24 Seagate Technology Llc System and method for magnetic storage disposal
US20050273845A1 (en) * 2004-06-07 2005-12-08 Akihiro Urano Information processing device, program therefor, and information processing system wherein information processing devices are connected via a network
US6981016B1 (en) * 1999-06-11 2005-12-27 Visage Development Limited Distributed client/server computer network
US7096370B1 (en) * 1999-03-26 2006-08-22 Micron Technology, Inc. Data security for digital data storage
US20060203106A1 (en) * 2005-03-14 2006-09-14 Lawrence Joseph P Methods and apparatus for retrieving data captured by a media device
US7127454B2 (en) 2001-08-17 2006-10-24 Sony Corporation E-marker find music
US20070079141A1 (en) * 2005-09-30 2007-04-05 Kabushiki Kaisha Toshiba Information processing apparatus and method of controlling the same
US20070220369A1 (en) * 2006-02-21 2007-09-20 International Business Machines Corporation Fault isolation and availability mechanism for multi-processor system
US20080072297A1 (en) * 2006-09-20 2008-03-20 Feitian Technologies Co., Ltd. Method for protecting software based on network
US20080089521A1 (en) * 2003-04-29 2008-04-17 Eric Le Saint Universal secure messaging for cryptographic modules
US20080181412A1 (en) * 2007-01-26 2008-07-31 Microsoft Corporation Cryptographic key containers on a usb token
US20080201764A1 (en) * 2007-02-15 2008-08-21 Zhou Lu Method and system for controlling the smart electric appliance
US7454531B2 (en) * 2002-01-23 2008-11-18 Taiguen Technology (Shen—Zhen) Co., Ltd. USB portable storage capable of being upgraded and capacity-expanded freely by replacement of storage medium
US20080301764A1 (en) * 2007-05-31 2008-12-04 Oberthur Technologies Portable electronic entity, host station and associated method
US20100011200A1 (en) * 2006-05-24 2010-01-14 Rosenan Avner Method and system for defending security application in a user's computer
US20100043078A1 (en) * 2004-02-23 2010-02-18 Lexar Media, Inc. Secure compact flash
US7725607B1 (en) * 2000-05-16 2010-05-25 Palmsource, Inc. Method and system for enabling personal digital assistants and protecting stored private data
USRE42397E1 (en) 1999-04-05 2011-05-24 Sandisk Il Ltd. Architecture for a universal serial bus-based PC flash disk
US20120226910A1 (en) * 2011-03-04 2012-09-06 International Business Machines Corporation Security device for electronics
US20120297205A1 (en) * 2011-05-18 2012-11-22 Cpo Technologies Corporation Secure User/Host Authentication
US8402533B2 (en) 2010-08-06 2013-03-19 Google Inc. Input to locked computing device
US8423789B1 (en) * 2007-05-22 2013-04-16 Marvell International Ltd. Key generation techniques
EP2660749A1 (fr) * 2012-05-03 2013-11-06 Siemens Aktiengesellschaft Dispositif de commande avec moyen d'authentification
US8645716B1 (en) 2010-10-08 2014-02-04 Marvell International Ltd. Method and apparatus for overwriting an encryption key of a media drive
US9117354B2 (en) 2011-03-04 2015-08-25 International Business Machines Corporation System and method for protecting against tampering with a security device
US9575768B1 (en) 2013-01-08 2017-02-21 Marvell International Ltd. Loading boot code from multiple memories
US9652249B1 (en) 2008-09-18 2017-05-16 Marvell World Trade Ltd. Preloading an application while an operating system loads
US9736801B1 (en) 2013-05-20 2017-08-15 Marvell International Ltd. Methods and apparatus for synchronizing devices in a wireless data communication system
US9769653B1 (en) 2008-08-20 2017-09-19 Marvell International Ltd. Efficient key establishment for wireless networks
US9836306B2 (en) 2013-07-31 2017-12-05 Marvell World Trade Ltd. Parallelizing boot operations
US9860862B1 (en) 2013-05-21 2018-01-02 Marvell International Ltd. Methods and apparatus for selecting a device to perform shared functionality in a deterministic and fair manner in a wireless data communication system
US9900431B1 (en) 2017-08-04 2018-02-20 At&T Intellectual Property I, L.P. Communications handler for screening incoming calls
US9946852B1 (en) * 2009-10-20 2018-04-17 Symantec Corporation Commodity hardware based parental control device
US10275377B2 (en) 2011-11-15 2019-04-30 Marvell World Trade Ltd. Dynamic boot image streaming
US10979412B2 (en) 2016-03-08 2021-04-13 Nxp Usa, Inc. Methods and apparatus for secure device authentication

Families Citing this family (58)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7272723B1 (en) * 1999-01-15 2007-09-18 Safenet, Inc. USB-compliant personal key with integral input and output devices
US7269844B2 (en) * 1999-01-15 2007-09-11 Safenet, Inc. Secure IR communication between a keypad and a token
US7278016B1 (en) 1999-10-26 2007-10-02 International Business Machines Corporation Encryption/decryption of stored data using non-accessible, unique encryption key
US20020145632A1 (en) * 2000-10-27 2002-10-10 Shimon Shmueli Portable interface for computing
US7373656B2 (en) * 2000-10-27 2008-05-13 Sandisk Il Ltd. Automatic configuration for portable devices
US7606733B2 (en) * 2000-10-27 2009-10-20 Sandisk Il Ltd. Account portability for computing
US6986030B2 (en) * 2000-10-27 2006-01-10 M-Systems Flash Disk Pioneers Ltd. Portable memory device includes software program for interacting with host computing device to provide a customized configuration for the program
US20020162009A1 (en) * 2000-10-27 2002-10-31 Shimon Shmueli Privacy assurance for portable computing
US20020071147A1 (en) * 2000-12-12 2002-06-13 Kuang-Shin Lin Method of automatically synchronously testing the infrared equipment of an electronic apparatus
WO2002048837A2 (fr) * 2000-12-15 2002-06-20 Polycom, Inc. Systeme et procede permettant de determiner la co-localisation de dispositifs
US7305560B2 (en) * 2000-12-27 2007-12-04 Proxense, Llc Digital content security system
US9613483B2 (en) * 2000-12-27 2017-04-04 Proxense, Llc Personal digital key and receiver/decoder circuit system and method
US7472280B2 (en) * 2000-12-27 2008-12-30 Proxense, Llc Digital rights management
US20020080969A1 (en) * 2000-12-27 2002-06-27 Giobbi John J. Digital rights management system and method
US6973576B2 (en) * 2000-12-27 2005-12-06 Margent Development, Llc Digital content security system
US7117376B2 (en) * 2000-12-28 2006-10-03 Intel Corporation Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations
TWI225211B (en) * 2001-02-15 2004-12-11 Ibm Security system for preventing a personal computer from being stolen or used by unauthorized people
US7302571B2 (en) * 2001-04-12 2007-11-27 The Regents Of The University Of Michigan Method and system to maintain portable computer data secure and authentication token for use therein
US7434067B1 (en) * 2001-04-26 2008-10-07 Palmsource, Inc. Method and system for a security technique for enabling an electronic device to run controlled test applications
FR2832574B1 (fr) * 2001-11-19 2004-02-27 Cyber Comm Appareil de certification, procede et dispositif pour authentifier une origine de message
IL146897A (en) * 2001-12-04 2006-10-31 Meir Avganim Computer protection devices
US20030112978A1 (en) * 2001-12-17 2003-06-19 Jeffrey Rodman System and method for secured data transmission within a wireless communication system
DE10211036A1 (de) * 2002-03-13 2003-10-09 Fujitsu Siemens Computers Gmbh Zugangsschutz
US7158008B2 (en) * 2002-03-29 2007-01-02 Datakey Electronincs, Inc. Electronic key system and method
US7299364B2 (en) * 2002-04-09 2007-11-20 The Regents Of The University Of Michigan Method and system to maintain application data secure and authentication token for use therein
DE20206628U1 (de) * 2002-04-22 2003-09-04 Peeters Bernd Vorrichtung zum Schutz gegen unauthorisierte Benutzung von Software
EP1669834A4 (fr) * 2003-10-02 2009-02-04 Panasonic Corp Systeme de securite pour dispositif electronique
US9020854B2 (en) 2004-03-08 2015-04-28 Proxense, Llc Linked account system using personal digital key (PDK-LAS)
EP1829283A2 (fr) 2004-12-20 2007-09-05 Proxense, LLC Authentification d'une cle de donnees personnelles biometriques
US7743406B2 (en) * 2004-12-21 2010-06-22 International Business Machines Corporation System and method of preventing alteration of data on a wireless device
US20060135121A1 (en) * 2004-12-21 2006-06-22 Abedi Scott S System and method of securing data on a wireless device
US7506380B2 (en) * 2005-01-14 2009-03-17 Microsoft Corporation Systems and methods for boot recovery in a secure boot process on a computer with a hardware security module
US7565553B2 (en) * 2005-01-14 2009-07-21 Microsoft Corporation Systems and methods for controlling access to data on a computer with a secure boot process
US20070025554A1 (en) * 2005-08-01 2007-02-01 Ping-Wen Ong Remote control association methodology
US20070101112A1 (en) * 2005-10-27 2007-05-03 Inventec Corporation Embedded device detecting system and related method
US8433919B2 (en) * 2005-11-30 2013-04-30 Proxense, Llc Two-level authentication for secure transactions
US9113464B2 (en) 2006-01-06 2015-08-18 Proxense, Llc Dynamic cell size variation via wireless link parameter adjustment
US11206664B2 (en) 2006-01-06 2021-12-21 Proxense, Llc Wireless network synchronization of cells and client devices on a network
US9269221B2 (en) * 2006-11-13 2016-02-23 John J. Gobbi Configuration of interfaces for a location detection system and application
US7883003B2 (en) 2006-11-13 2011-02-08 Proxense, Llc Tracking system using personal digital key groups
US20090140837A1 (en) * 2007-07-19 2009-06-04 Glen Eric Jennings RF Token and Receptacle System and Method
US20100264218A1 (en) * 2007-08-29 2010-10-21 Datakey Electronics, Inc Data carrier system and method
WO2009062194A1 (fr) 2007-11-09 2009-05-14 Proxense, Llc Capteur de proximité de support de services d'applications multiples
US8171528B1 (en) 2007-12-06 2012-05-01 Proxense, Llc Hybrid device having a personal digital key and receiver-decoder circuit and methods of use
WO2009079666A1 (fr) 2007-12-19 2009-06-25 Proxense, Llc Système de sécurité et procédé de contrôle d'accès à des ressources informatiques
US8508336B2 (en) 2008-02-14 2013-08-13 Proxense, Llc Proximity-based healthcare management system with automatic access to private information
US11120449B2 (en) 2008-04-08 2021-09-14 Proxense, Llc Automated service-based order processing
AU2009201551A1 (en) 2008-05-02 2009-11-19 Aristocrat Technologies Australia Pty Limited A gaming system and a method of monitoring a gaming device
USD649894S1 (en) 2008-12-30 2011-12-06 Atek Products, Llc Electronic token and data carrier
WO2010088556A1 (fr) 2009-01-30 2010-08-05 Datakey Electronics, Inc. Système de support de données ayant une empreinte compacte et procédés de fabrication de celui-ci
USD649896S1 (en) 2009-01-30 2011-12-06 Atek Products, Llc Electronic token and data carrier receptacle
USD649895S1 (en) 2009-01-30 2011-12-06 Atek Products, Llc Electronic token and data carrier
US20100235906A1 (en) * 2009-03-12 2010-09-16 Nokia Corporation Method and apparatus for activate an authentication on a mobile device
USD649486S1 (en) 2009-07-09 2011-11-29 ATEK Products , LLC Electronic token and data carrier
US9418205B2 (en) 2010-03-15 2016-08-16 Proxense, Llc Proximity-based system for automatic application or data access and item tracking
US8918854B1 (en) 2010-07-15 2014-12-23 Proxense, Llc Proximity-based system for automatic application initialization
US8857716B1 (en) 2011-02-21 2014-10-14 Proxense, Llc Implementation of a proximity-based system for object tracking and automatic application initialization
WO2014183106A2 (fr) 2013-05-10 2014-11-13 Proxense, Llc Element securise sous la forme de poche numerique

Citations (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4789859A (en) 1986-03-21 1988-12-06 Emhart Industries, Inc. Electronic locking system and key therefor
US4937437A (en) 1984-08-15 1990-06-26 Ferguson Terry T Security system for electronic equipment
US4975550A (en) 1989-06-12 1990-12-04 Panchisin S Joseph Security device for computers
US4993627A (en) 1989-05-02 1991-02-19 Phelan Michael D Electronically controlled locking mechanism
US5012514A (en) 1990-06-26 1991-04-30 Paul Renton Hard drive security system
US5072101A (en) 1984-08-15 1991-12-10 Cynthia A. Ferguson Computer security system with key-receiving socket
US5077991A (en) 1988-08-08 1992-01-07 Siemens Aktiengesellschaft Lock mechanism for multi-component data processing equipment
US5142269A (en) 1991-04-01 1992-08-25 Charles T. Rush Electronic component theft sensor and security system
US5265163A (en) 1989-12-13 1993-11-23 International Business Machines Corp. Computer system security device
US5287408A (en) 1992-08-31 1994-02-15 Autodesk, Inc. Apparatus and method for serializing and validating copies of computer software
US5341421A (en) 1990-11-06 1994-08-23 Bull Cp8 Security device, including a memory and/or a microcomputer for data processing machines
US5361610A (en) 1993-09-22 1994-11-08 Richard Sanders Totelock
US5367295A (en) 1992-02-14 1994-11-22 Security People, Inc. Conventional mechanical lock cylinders and keys with electronic access control feature
US5402492A (en) 1993-06-18 1995-03-28 Ast Research, Inc. Security system for a stand-alone computer
US5416840A (en) * 1993-07-06 1995-05-16 Phoenix Technologies, Ltd. Software catalog encoding method and system
US5450271A (en) 1992-10-29 1995-09-12 International Business Machines Corporation Portable computer docking apparatus including a key mechanism controlling a power supply and a locking mechanism
US5461218A (en) 1992-06-22 1995-10-24 Lynx Systems, Inc. Electronic key having an elongated handle and requiring no rotation about the handle axis; method of use thereof
US5475839A (en) 1990-03-28 1995-12-12 National Semiconductor Corporation Method and structure for securing access to a computer system
US5499297A (en) 1992-04-17 1996-03-12 Secure Computing Corporation System and method for trusted path communications
US5517569A (en) 1994-03-18 1996-05-14 Clark; Dereck B. Methods and apparatus for interfacing an encryption module with a personal computer
US5533125A (en) 1993-04-06 1996-07-02 International Business Machines Corporation Removable computer security device
US5542044A (en) 1994-12-12 1996-07-30 Pope; Shawn P. Security device for a computer, and methods of constructing and utilizing same
US5546463A (en) 1994-07-12 1996-08-13 Information Resource Engineering, Inc. Pocket encrypting and authenticating communications device
US5548479A (en) 1993-09-02 1996-08-20 Icl Personal Systems Oy Device for protecting a memory or microcircuit unit
US5568552A (en) 1994-09-07 1996-10-22 Intel Corporation Method for providing a roving software license from one node to another node
US5572193A (en) * 1990-12-07 1996-11-05 Motorola, Inc. Method for authentication and protection of subscribers in telecommunications systems
US5587878A (en) 1995-02-15 1996-12-24 Acer Incorporated Anti-theft mechanism in a computer system having removable modules
US5598323A (en) 1994-03-03 1997-01-28 Tulip Computers International B.V. Device for protecting a computer
US5603008A (en) 1992-09-30 1997-02-11 Amdahl Corporation Computer system having cache memories with independently validated keys in the TLB
US5606615A (en) 1995-05-16 1997-02-25 Lapointe; Brian K. Computer security system
US5608387A (en) 1991-11-30 1997-03-04 Davies; John H. E. Personal identification devices and access control systems
US5610981A (en) 1992-06-04 1997-03-11 Integrated Technologies Of America, Inc. Preboot protection for a data security system with anti-intrusion capability
US5623637A (en) 1993-12-06 1997-04-22 Telequip Corporation Encrypted data storage card including smartcard integrated circuit for storing an access password and encryption keys
US5642805A (en) 1995-10-12 1997-07-01 Tefft; Brian Input device lock
US5651068A (en) 1995-03-08 1997-07-22 Hewlett-Packard Company International cryptography framework
US5655020A (en) * 1992-05-08 1997-08-05 Wesco Software Limited Authenticating the identity of an authorized person
US5657470A (en) 1994-11-09 1997-08-12 Ybm Technologies, Inc. Personal computer hard disk protection system
US5732137A (en) * 1994-06-03 1998-03-24 Sun Microsystems, Inc. Method and apparatus for secure remote authentication in a public network
US5867106A (en) * 1994-09-02 1999-02-02 Packard Bell Nec Password switch to override remote control

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4609777A (en) 1984-02-22 1986-09-02 Gordian Systems, Inc. Solid state key for controlling access to computer software
DE9001732U1 (de) 1990-02-14 1991-06-13 Stabila-Messgeräte Gustav Ullrich GmbH & Co KG, 6747 Annweiler Rollbandmaß
US5081676A (en) 1990-10-04 1992-01-14 Chou Wayne W Method and apparatus for protecting multiple copies of computer software from unauthorized use
US5313639A (en) 1992-06-26 1994-05-17 George Chao Computer with security device for controlling access thereto
US5588059A (en) 1995-03-02 1996-12-24 Motorola, Inc. Computer system and method for secure remote communication sessions
US6038549A (en) * 1997-12-22 2000-03-14 Motorola Inc Portable 1-way wireless financial messaging unit
US6189099B1 (en) * 1998-02-11 2001-02-13 Durango Corporation Notebook security system (NBS)
US6216230B1 (en) * 1998-02-11 2001-04-10 Durango Corporation Notebook security system (NBS)

Patent Citations (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4937437A (en) 1984-08-15 1990-06-26 Ferguson Terry T Security system for electronic equipment
US5072101A (en) 1984-08-15 1991-12-10 Cynthia A. Ferguson Computer security system with key-receiving socket
US4789859A (en) 1986-03-21 1988-12-06 Emhart Industries, Inc. Electronic locking system and key therefor
US5077991A (en) 1988-08-08 1992-01-07 Siemens Aktiengesellschaft Lock mechanism for multi-component data processing equipment
US4993627A (en) 1989-05-02 1991-02-19 Phelan Michael D Electronically controlled locking mechanism
US4975550A (en) 1989-06-12 1990-12-04 Panchisin S Joseph Security device for computers
US5265163A (en) 1989-12-13 1993-11-23 International Business Machines Corp. Computer system security device
US5475839A (en) 1990-03-28 1995-12-12 National Semiconductor Corporation Method and structure for securing access to a computer system
US5012514A (en) 1990-06-26 1991-04-30 Paul Renton Hard drive security system
US5341421A (en) 1990-11-06 1994-08-23 Bull Cp8 Security device, including a memory and/or a microcomputer for data processing machines
US5572193A (en) * 1990-12-07 1996-11-05 Motorola, Inc. Method for authentication and protection of subscribers in telecommunications systems
US5142269A (en) 1991-04-01 1992-08-25 Charles T. Rush Electronic component theft sensor and security system
US5608387A (en) 1991-11-30 1997-03-04 Davies; John H. E. Personal identification devices and access control systems
US5367295A (en) 1992-02-14 1994-11-22 Security People, Inc. Conventional mechanical lock cylinders and keys with electronic access control feature
US5499297A (en) 1992-04-17 1996-03-12 Secure Computing Corporation System and method for trusted path communications
US5655020A (en) * 1992-05-08 1997-08-05 Wesco Software Limited Authenticating the identity of an authorized person
US5610981A (en) 1992-06-04 1997-03-11 Integrated Technologies Of America, Inc. Preboot protection for a data security system with anti-intrusion capability
US5461218A (en) 1992-06-22 1995-10-24 Lynx Systems, Inc. Electronic key having an elongated handle and requiring no rotation about the handle axis; method of use thereof
US5287408A (en) 1992-08-31 1994-02-15 Autodesk, Inc. Apparatus and method for serializing and validating copies of computer software
US5603008A (en) 1992-09-30 1997-02-11 Amdahl Corporation Computer system having cache memories with independently validated keys in the TLB
US5450271A (en) 1992-10-29 1995-09-12 International Business Machines Corporation Portable computer docking apparatus including a key mechanism controlling a power supply and a locking mechanism
US5533125A (en) 1993-04-06 1996-07-02 International Business Machines Corporation Removable computer security device
US5402492A (en) 1993-06-18 1995-03-28 Ast Research, Inc. Security system for a stand-alone computer
US5416840A (en) * 1993-07-06 1995-05-16 Phoenix Technologies, Ltd. Software catalog encoding method and system
US5548479A (en) 1993-09-02 1996-08-20 Icl Personal Systems Oy Device for protecting a memory or microcircuit unit
US5361610A (en) 1993-09-22 1994-11-08 Richard Sanders Totelock
US5623637A (en) 1993-12-06 1997-04-22 Telequip Corporation Encrypted data storage card including smartcard integrated circuit for storing an access password and encryption keys
US5598323A (en) 1994-03-03 1997-01-28 Tulip Computers International B.V. Device for protecting a computer
US5517569A (en) 1994-03-18 1996-05-14 Clark; Dereck B. Methods and apparatus for interfacing an encryption module with a personal computer
US5732137A (en) * 1994-06-03 1998-03-24 Sun Microsystems, Inc. Method and apparatus for secure remote authentication in a public network
US5546463A (en) 1994-07-12 1996-08-13 Information Resource Engineering, Inc. Pocket encrypting and authenticating communications device
US5867106A (en) * 1994-09-02 1999-02-02 Packard Bell Nec Password switch to override remote control
US5568552A (en) 1994-09-07 1996-10-22 Intel Corporation Method for providing a roving software license from one node to another node
US5657470A (en) 1994-11-09 1997-08-12 Ybm Technologies, Inc. Personal computer hard disk protection system
US5542044A (en) 1994-12-12 1996-07-30 Pope; Shawn P. Security device for a computer, and methods of constructing and utilizing same
US5587878A (en) 1995-02-15 1996-12-24 Acer Incorporated Anti-theft mechanism in a computer system having removable modules
US5651068A (en) 1995-03-08 1997-07-22 Hewlett-Packard Company International cryptography framework
US5606615A (en) 1995-05-16 1997-02-25 Lapointe; Brian K. Computer security system
US5642805A (en) 1995-10-12 1997-07-01 Tefft; Brian Input device lock

Non-Patent Citations (15)

* Cited by examiner, † Cited by third party
Title
Are Smartcards a Certificate Solution?, found at <http://www.byte.com/art/9706/sec5/art4.htm> (Feb. 4, 1998).
bluVenom Anti-Theft Devices Inc., found at <http://www.bluvenom.com/body_home.html> (Feb. 2, 1998).
EliaShim releases EasySafe Version 3.1 To Secure Data on DOS/Windows & Windows 95 Laptops, found at <http://www.virussafe.com/presel/pr0907.html> (Jan. 13, 1998).
EY-LOK II dongle security devices, found at <http://www.keylok.com/> (Feb. 4, 1998).
Infrard Data Association Serial Infrared Physical Layer Link Specification, Version 1.2, Nov. 10, 1997, Joe Tajnai of HP, joe_tajnai@hp.com., John Petrilla of HP, john_petrilla@hp.com.
Infrared Data Association Guidelines For Ultra Protocols, Version 1.0, Oct. 15, 1997, Petri Nykanen Petri.Nykanen@nmp.nokia.com (Nokia Mobile Phones Ltd.) Paul Rubin phr@wireless.com, Mike Cheponis mike@wireless.com (California Wireless, Inc.).
International Search Report-International Application No. PCT/US 99/17315, dated Oct. 12, 1999, International Filing Date Jul. 29, 1999, applicant Durango Corporation.
M-Crypt-The Ideal in Laptop and Desktop Protection, found at <http://www.securedata.com/ip/mcrypt/mcrypt.html> (Jan. 13, 1998).
M-Crypt—The Ideal in Laptop and Desktop Protection, found at <http://www.securedata.com/ip/mcrypt/mcrypt.html> (Jan. 13, 1998).
SafeHouse for Windows, found at <http://www.pcdynamics.com/SafeHouse/startpage.html> (Jan. 13, 1998).
SecuriKey for PC's, found at <http://www.datasec.com/SecruPC.htm> (Feb. 4, 1998).
SecurityPak-Complete Computer Security Solution, found at <http://acan.net/~portapak/securitypak.html> (Jan. 13, 1998).
SecurityPak—Complete Computer Security Solution, found at <http://acan.net/˜portapak/securitypak.html> (Jan. 13, 1998).
Serial Cable with Security Key, found at <http://www.scintco.com/skey1.htm> (Feb. 4, 1998).
Wiener, P. et al., "Meeting USB and IEEE 1394 Overcurrent Protection Requirements Using PolySwitch Devices," Wescon/97 Conf. Proc., Nov. 6, 1997, pp. 442-475.*

Cited By (130)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6401205B1 (en) * 1998-02-11 2002-06-04 Durango Corporation Infrared type security system for a computer
US6425084B1 (en) * 1998-02-11 2002-07-23 Durango Corporation Notebook security system using infrared key
US6763399B2 (en) * 1998-11-10 2004-07-13 Aladdin Knowledge Systems, Ltd. USB key apparatus for interacting with a USB host via a USB port
US7111324B2 (en) * 1999-01-15 2006-09-19 Safenet, Inc. USB hub keypad
US20010043702A1 (en) * 1999-01-15 2001-11-22 Laszlo Elteto USB hub keypad
US6671808B1 (en) * 1999-01-15 2003-12-30 Rainbow Technologies, Inc. USB-compliant personal key
US6675300B1 (en) * 1999-03-12 2004-01-06 Samsung Electronics Co., Ltd. Remote controlled computer system and management method having an identification number
US7861094B2 (en) 1999-03-26 2010-12-28 Round Rock Research, Llc Data security for digital data storage
US20070067647A1 (en) * 1999-03-26 2007-03-22 Klein Dean A Data security for digital data storage
US7979720B2 (en) 1999-03-26 2011-07-12 Round Rock Research, Llc Data security for digital data storage
US7096370B1 (en) * 1999-03-26 2006-08-22 Micron Technology, Inc. Data security for digital data storage
US20050114659A1 (en) * 1999-03-26 2005-05-26 Klein Dean A. Data security for digital data storage
US7114082B2 (en) 1999-03-26 2006-09-26 Micron Technology Inc. Data security for digital data storage
US8533491B2 (en) 1999-03-26 2013-09-10 Round Rock Research, Llc Data security for digital data storage
US6857076B1 (en) 1999-03-26 2005-02-15 Micron Technology, Inc. Data security for digital data storage
US9117095B2 (en) 1999-03-26 2015-08-25 Round Rock Research Llc Data security for digital data storage
US20070016805A1 (en) * 1999-03-26 2007-01-18 Klein Dean A Data security for digital data storage
USRE42397E1 (en) 1999-04-05 2011-05-24 Sandisk Il Ltd. Architecture for a universal serial bus-based PC flash disk
USRE42443E1 (en) 1999-04-05 2011-06-07 Sandisk Il Ltd. Architecture for a universal serial bus-based PC flash disk
USRE44653E1 (en) 1999-04-05 2013-12-17 Sandisk Il, Ltd USB flash memory device with integral memory technology driver
USRE44641E1 (en) 1999-04-05 2013-12-10 Sandisk Il, Ltd USB flash memory device with integrated USB controller
US6275933B1 (en) * 1999-04-30 2001-08-14 3Com Corporation Security system for a computerized apparatus
US6564325B1 (en) * 1999-05-07 2003-05-13 Nortel Networks Limited Method of and apparatus for providing multi-level security access to system
US6981016B1 (en) * 1999-06-11 2005-12-27 Visage Development Limited Distributed client/server computer network
US7703688B2 (en) * 2000-03-15 2010-04-27 Gemalto Sa Method of communication between a smart card and a host station
US20050211788A1 (en) * 2000-03-15 2005-09-29 Nicolas Drabczuk Method of communication between a smart card and a host station
US20100235601A1 (en) * 2000-05-16 2010-09-16 Palmsource, Inc. Method and system for enabling personal digital assistants and protecting stored private data
US7725607B1 (en) * 2000-05-16 2010-05-25 Palmsource, Inc. Method and system for enabling personal digital assistants and protecting stored private data
US8001288B2 (en) 2000-05-16 2011-08-16 Access Co., Ltd. Method and system for enabling personal digital assistants and protecting stored private data
US7895265B2 (en) 2000-07-14 2011-02-22 Sony Corporation Method and system for identifying a time specific event
US7062528B2 (en) 2000-07-14 2006-06-13 Sony Corporation Method and system for identifying a time specific event
US20020010652A1 (en) * 2000-07-14 2002-01-24 Sony Corporation Vendor ID tracking for e-marker
US20020007354A1 (en) * 2000-07-14 2002-01-17 Sony Corporation Method and system for identifying a time specific event
US20040049679A1 (en) * 2000-11-21 2004-03-11 Claude Meggle Authenticating method and device
US20100005287A1 (en) * 2001-03-27 2010-01-07 Micron Technology, Inc. Data security for digital data storage
US8191159B2 (en) 2001-03-27 2012-05-29 Micron Technology, Inc Data security for digital data storage
US7526795B2 (en) 2001-03-27 2009-04-28 Micron Technology, Inc. Data security for digital data storage
US9003177B2 (en) 2001-03-27 2015-04-07 Micron Technology, Inc. Data security for digital data storage
US20070014412A1 (en) * 2001-03-27 2007-01-18 Rollins Doug L Data security for digital data storage
US7594257B2 (en) 2001-03-27 2009-09-22 Micron Technology, Inc. Data security for digital data storage
US20020141588A1 (en) * 2001-03-27 2002-10-03 Rollins Doug L. Data security for digital data storage
US7540018B2 (en) 2001-03-27 2009-05-26 Micron Technology, Inc. Data security for digital data storage
US20020145589A1 (en) * 2001-04-06 2002-10-10 Sony Corporation Of Japan User interface for an e-marker
US20040143730A1 (en) * 2001-06-15 2004-07-22 Wu Wen Universal secure messaging for remote security tokens
US8209753B2 (en) * 2001-06-15 2012-06-26 Activcard, Inc. Universal secure messaging for remote security tokens
KR20010082420A (ko) * 2001-06-19 2001-08-30 서정욱 범용 직렬 버스용 암복호화 장치
WO2003001350A3 (fr) * 2001-06-26 2003-03-06 Redstrike B V Systeme et logiciel de securite servant a empecher l'utilisation illicite d'un dispositif informatique
EP1271277A2 (fr) * 2001-06-26 2003-01-02 Redstrike B.V. Système de sécurité pour empêcher l'utilisation frauduleuse d'un ordinateur
WO2003001350A2 (fr) * 2001-06-26 2003-01-03 Redstrike B.V. Systeme et logiciel de securite servant a empecher l'utilisation illicite d'un dispositif informatique
EP1271277A3 (fr) * 2001-06-26 2003-02-05 Redstrike B.V. Système de sécurité pour empêcher l'utilisation frauduleuse d'un ordinateur
US7127454B2 (en) 2001-08-17 2006-10-24 Sony Corporation E-marker find music
US20030036967A1 (en) * 2001-08-17 2003-02-20 Yuichiro Deguchi Electronic music marker device delayed notification
US20030036352A1 (en) * 2001-08-17 2003-02-20 Sony Corporation Embedded e-marker and communication system
US20030034956A1 (en) * 2001-08-17 2003-02-20 Yuichiro Deguchi Virtual e-marker
US20060259375A1 (en) * 2001-08-17 2006-11-16 Yuichiro Deguchi Electronic music marker device delayed notification
US7107234B2 (en) 2001-08-17 2006-09-12 Sony Corporation Electronic music marker device delayed notification
US8271354B2 (en) 2001-08-17 2012-09-18 Sony Corporation Electronic music marker device delayed notification
US20030110133A1 (en) * 2001-12-07 2003-06-12 Maritzen L. Michael Automated digital rights management and payment system with embedded content
US20050182872A1 (en) * 2001-12-29 2005-08-18 Tai Guen Enterprise Co., Ltd Portable data conversion processor with standard data port
US7296098B2 (en) * 2001-12-29 2007-11-13 Taiguen Technology (Shen-Zhen), Co., Ltd. Portable data converting and processing storage device with standard interface wherein the body unity does not include any built-in flash memory
US7454531B2 (en) * 2002-01-23 2008-11-18 Taiguen Technology (Shen—Zhen) Co., Ltd. USB portable storage capable of being upgraded and capacity-expanded freely by replacement of storage medium
US20040002938A1 (en) * 2002-06-28 2004-01-01 Sony Corporation And Sony Electronics Inc. Device and method for exchanging information
US6972698B2 (en) 2002-06-28 2005-12-06 Sony Corporation GPS e-marker
US20040000995A1 (en) * 2002-06-28 2004-01-01 Yuichiro Deguchi GPS e-marker
US20040003150A1 (en) * 2002-06-28 2004-01-01 Sony Corporation Appliance with built-in integrated communication port
US20050251596A1 (en) * 2002-07-15 2005-11-10 Axalto Sa Usb device
US20040049686A1 (en) * 2002-09-05 2004-03-11 Chun-Yu Chen Fingerprint identification applied data storage system and method
US20040098585A1 (en) * 2002-11-05 2004-05-20 Rainbow Technologies, Inc. Secure authentication using hardware token and computer fingerprint
US20100100746A1 (en) * 2002-11-05 2010-04-22 Safenet, Inc. Secure authentication using hardware token and computer fingerprint
US7895443B2 (en) 2002-11-05 2011-02-22 Safenet, Inc. Secure authentication using hardware token and computer fingerprint
US20080065887A1 (en) * 2002-11-05 2008-03-13 Safenet, Inc. Secure authentication using hardware token and computer fingerprint
US8392978B2 (en) 2002-11-05 2013-03-05 Safenet, Inc. Secure authentication using hardware token and computer fingerprint
US8065718B2 (en) 2002-11-05 2011-11-22 Safenet, Inc. Secure authentication using hardware token and computer fingerprint
US20040098596A1 (en) * 2002-11-15 2004-05-20 Rainbow Technologies, Inc. Driverless USB security token
US20040170068A1 (en) * 2003-02-27 2004-09-02 Williams Emrys J. Anti-theft system and method for semiconductor devices and other electronic components
US7681247B2 (en) * 2003-02-27 2010-03-16 Sun Microsystems, Inc. Anti-theft system and method for semiconductor devices and other electronic components
US20080089521A1 (en) * 2003-04-29 2008-04-17 Eric Le Saint Universal secure messaging for cryptographic modules
US8306228B2 (en) 2003-04-29 2012-11-06 Activcard Ireland, Limited Universal secure messaging for cryptographic modules
US10554393B2 (en) 2003-04-29 2020-02-04 Assa Abloy Ab Universal secure messaging for cryptographic modules
US20050188224A1 (en) * 2004-01-05 2005-08-25 Betts-Lacroix Jonathan Connector including electronic device
US20140033328A1 (en) * 2004-02-23 2014-01-30 Micron Technology, Inc. Secure compact flash
US8533856B2 (en) * 2004-02-23 2013-09-10 Micron Technology, Inc. Secure compact flash
US20100043078A1 (en) * 2004-02-23 2010-02-18 Lexar Media, Inc. Secure compact flash
US9098440B2 (en) * 2004-02-23 2015-08-04 Micron Technology, Inc. Secure compact flash
US20150331811A1 (en) * 2004-02-23 2015-11-19 Micron Technology, Inc. Secure compact flash
US9514063B2 (en) * 2004-02-23 2016-12-06 Micron Technology, Inc. Secure compact flash
US20050240779A1 (en) * 2004-04-26 2005-10-27 Aull Kenneth W Secure local or remote biometric(s) identity and privilege (BIOTOKEN)
US7805614B2 (en) * 2004-04-26 2010-09-28 Northrop Grumman Corporation Secure local or remote biometric(s) identity and privilege (BIOTOKEN)
US20050262361A1 (en) * 2004-05-24 2005-11-24 Seagate Technology Llc System and method for magnetic storage disposal
US20050273845A1 (en) * 2004-06-07 2005-12-08 Akihiro Urano Information processing device, program therefor, and information processing system wherein information processing devices are connected via a network
US20060203106A1 (en) * 2005-03-14 2006-09-14 Lawrence Joseph P Methods and apparatus for retrieving data captured by a media device
US7437198B2 (en) * 2005-09-30 2008-10-14 Kabushiki Kaisha Toshiba Information processing apparatus and method of controlling the same
US20070079141A1 (en) * 2005-09-30 2007-04-05 Kabushiki Kaisha Toshiba Information processing apparatus and method of controlling the same
US20070220369A1 (en) * 2006-02-21 2007-09-20 International Business Machines Corporation Fault isolation and availability mechanism for multi-processor system
US9424430B2 (en) * 2006-05-24 2016-08-23 Safend Ltd. Method and system for defending security application in a user's computer
US20100011200A1 (en) * 2006-05-24 2010-01-14 Rosenan Avner Method and system for defending security application in a user's computer
US20080072297A1 (en) * 2006-09-20 2008-03-20 Feitian Technologies Co., Ltd. Method for protecting software based on network
US8321924B2 (en) * 2006-09-20 2012-11-27 Feitian Technologies Co., Ltd. Method for protecting software accessible over a network using a key device
US8588421B2 (en) 2007-01-26 2013-11-19 Microsoft Corporation Cryptographic key containers on a USB token
US20080181412A1 (en) * 2007-01-26 2008-07-31 Microsoft Corporation Cryptographic key containers on a usb token
US20080201764A1 (en) * 2007-02-15 2008-08-21 Zhou Lu Method and system for controlling the smart electric appliance
US7971067B2 (en) * 2007-02-15 2011-06-28 Feitian Technologies Co., Ltd. Method and system for controlling the smart electric appliance
US8423789B1 (en) * 2007-05-22 2013-04-16 Marvell International Ltd. Key generation techniques
US9037875B1 (en) * 2007-05-22 2015-05-19 Marvell International Ltd. Key generation techniques
US9047457B2 (en) * 2007-05-31 2015-06-02 Oberthur Technologies Portable electronic entity, host station and associated method
US20080301764A1 (en) * 2007-05-31 2008-12-04 Oberthur Technologies Portable electronic entity, host station and associated method
US9769653B1 (en) 2008-08-20 2017-09-19 Marvell International Ltd. Efficient key establishment for wireless networks
US9652249B1 (en) 2008-09-18 2017-05-16 Marvell World Trade Ltd. Preloading an application while an operating system loads
US9946852B1 (en) * 2009-10-20 2018-04-17 Symantec Corporation Commodity hardware based parental control device
US10565387B2 (en) 2010-08-06 2020-02-18 Google Llc Input to locked computing device
US8667562B2 (en) * 2010-08-06 2014-03-04 Google Inc. Input to locked computing device
US11263330B2 (en) 2010-08-06 2022-03-01 Google Llc Input to locked computing device
US9245151B2 (en) 2010-08-06 2016-01-26 Google Inc. Input to locked computing device
US8402533B2 (en) 2010-08-06 2013-03-19 Google Inc. Input to locked computing device
US8839413B2 (en) 2010-08-06 2014-09-16 Google Inc. Input to locked computing device
US8645716B1 (en) 2010-10-08 2014-02-04 Marvell International Ltd. Method and apparatus for overwriting an encryption key of a media drive
US8915971B2 (en) * 2011-03-04 2014-12-23 International Business Machines Corporation Security device for electronics
US9117354B2 (en) 2011-03-04 2015-08-25 International Business Machines Corporation System and method for protecting against tampering with a security device
US20120226910A1 (en) * 2011-03-04 2012-09-06 International Business Machines Corporation Security device for electronics
US20120297205A1 (en) * 2011-05-18 2012-11-22 Cpo Technologies Corporation Secure User/Host Authentication
US8683232B2 (en) * 2011-05-18 2014-03-25 Cpo Technologies Corporation Secure user/host authentication
US10275377B2 (en) 2011-11-15 2019-04-30 Marvell World Trade Ltd. Dynamic boot image streaming
EP2660749A1 (fr) * 2012-05-03 2013-11-06 Siemens Aktiengesellschaft Dispositif de commande avec moyen d'authentification
US9575768B1 (en) 2013-01-08 2017-02-21 Marvell International Ltd. Loading boot code from multiple memories
US9736801B1 (en) 2013-05-20 2017-08-15 Marvell International Ltd. Methods and apparatus for synchronizing devices in a wireless data communication system
US9860862B1 (en) 2013-05-21 2018-01-02 Marvell International Ltd. Methods and apparatus for selecting a device to perform shared functionality in a deterministic and fair manner in a wireless data communication system
US9836306B2 (en) 2013-07-31 2017-12-05 Marvell World Trade Ltd. Parallelizing boot operations
US10979412B2 (en) 2016-03-08 2021-04-13 Nxp Usa, Inc. Methods and apparatus for secure device authentication
US9900431B1 (en) 2017-08-04 2018-02-20 At&T Intellectual Property I, L.P. Communications handler for screening incoming calls
US10165115B1 (en) 2017-08-04 2018-12-25 At&T Intellectual Property I, L.P. Communications handler for screening incoming calls

Also Published As

Publication number Publication date
ATE234481T1 (de) 2003-03-15
AU5245599A (en) 2000-02-21
DE69905901D1 (de) 2003-04-17
US6425084B1 (en) 2002-07-23
EP1099147B1 (fr) 2003-03-12
EP1099147A1 (fr) 2001-05-16
WO2000007088A1 (fr) 2000-02-10

Similar Documents

Publication Publication Date Title
US6216230B1 (en) Notebook security system (NBS)
US6401205B1 (en) Infrared type security system for a computer
US5841868A (en) Trusted computer system
US7747797B2 (en) Mass storage device with near field communications
US6594765B2 (en) Method and system for embedded, automated, component-level control of computer systems and other complex systems
US7000249B2 (en) Pre-boot authentication system
CN1185584C (zh) 在非安全编程环境中安全密码的使用方法
US5887131A (en) Method for controlling access to a computer system by utilizing an external device containing a hash value representation of a user password
US6725382B1 (en) Device security mechanism based on registered passwords
KR100483293B1 (ko) 보안 시스템
US6108785A (en) Method and apparatus for preventing unauthorized usage of a computer system
US20140082375A1 (en) Data security for digital data storage
US7096496B1 (en) Method and system for improved computer security utilizing dynamically variable security profile
NO309887B1 (no) Sikkert minnekort
US20060010317A1 (en) Pre-boot authentication system
US20090222908A1 (en) Device for Transmission of Stored Password Information Through a Standard Computer Input Interface
US20090254762A1 (en) Access control for a memory device
WO2001010079A1 (fr) Adaptateur avec fonction sure et systeme informatique sur utilisant celui-ci
US8245054B2 (en) Secure and convenient access control for storage devices supporting passwords for individual partitions
US20010032319A1 (en) Biometric security system for computers and related method
WO1990015211A1 (fr) Systeme de securite
KR100429144B1 (ko) 컴퓨터 네트워크상의 컴퓨터에 보안을 제공하기 위한 방법
US20040098584A1 (en) Method and system for embedded, automated, component-level control of computer systems and other complex systems
US20030014642A1 (en) Security arrangement
KR20030049387A (ko) 확장 스마트 카드 시스템 및 그 제어 방법

Legal Events

Date Code Title Description
AS Assignment

Owner name: DURANGO CORPORATION, MASSACHUSETTS

Free format text: RELEASE AND STOCK TRANSFER;ASSIGNOR:RALLIS, WILLIAM N.;REEL/FRAME:011895/0434

Effective date: 19990705

REMI Maintenance fee reminder mailed
FPAY Fee payment

Year of fee payment: 4

SULP Surcharge for late payment
REMI Maintenance fee reminder mailed
LAPS Lapse for failure to pay maintenance fees
STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20090410